Transcript
Page 1: Security and Privacy in Mobile Cloud Computing

Security and Privacy in Mobile Cloud Computing

Ganesh Arkalgud(1RV11IS021)

Ram Kumar K R(1RV11IS042)

Mohammed Ehab(1RV11IS032)

Original paper by:Hui SuoZhuohua LiuJiafu WanKeliang Zhou

Page 2: Security and Privacy in Mobile Cloud Computing

Introduction

• Advantages of cloud computing

1. On-demand self service

2. Extendibility

• What is mobile cloud computing?

Page 3: Security and Privacy in Mobile Cloud Computing
Page 4: Security and Privacy in Mobile Cloud Computing

Products offered in mobile cloud segment

• Android OS.

• LiveMesh.

• iCloud.

Page 5: Security and Privacy in Mobile Cloud Computing

Factors affecting growth of mobile cloud segment

• Battery life dependencies.

• Limited resources of mobile devices.

• Wireless bandwidth and delay.

• Security of mobile cloud devices.

• Limited calculation speed.

Page 6: Security and Privacy in Mobile Cloud Computing

Model of Mobile Cloud Computing

Page 7: Security and Privacy in Mobile Cloud Computing

SECURITY AND PRIVACY ISSUES IN MOBILE CLOUD

COMPUTING

Page 8: Security and Privacy in Mobile Cloud Computing

Mobile terminal security issues

• Mobile Terminal.1. Open source OS2. Third party software3. Malware

• Software vulnerabilities1. Data transfer with phone and

computer using FTP.

• Mis-operation without knowledge.

Page 9: Security and Privacy in Mobile Cloud Computing

Mobile Network Security

1. Phone service.

2. SMS.

3. Wi-fi

4. Bluetooth etc.,

Page 10: Security and Privacy in Mobile Cloud Computing

Mobile Cloud

• Platform Reliabilitysusceptible to being attacked with DOS

• Data and Privacy Protectionownership and management of the users' data

To protect the sensitive data, the single means is not enough. We need a complete security solution to protect the data security and privacy of users.

Page 11: Security and Privacy in Mobile Cloud Computing

CURRENT SECURITY AND PRIVACY APROACHES FOR

MOBILE CLOUD COMPUTING

Page 12: Security and Privacy in Mobile Cloud Computing

Aiming at Mobile Terminal Security

• Anti-malwareEx: Cloud AV

• Software vulnerabilities

• Regulating Users' Behavior

Page 13: Security and Privacy in Mobile Cloud Computing

Aiming at Mobile Network Security

• Encryption

• Security Protocol

Page 14: Security and Privacy in Mobile Cloud Computing

Aiming at Mobile Cloud Security

• Protection to Platform Reliability

• Data Encryption and Key Management

• Authentication and Access Control

• Privacy Protection

Page 15: Security and Privacy in Mobile Cloud Computing

Summary

Page 16: Security and Privacy in Mobile Cloud Computing

THANK YOU


Recommended